Showing 5,321 - 5,340 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 5321

    ACTUAL PROBLEMS OF PERSONNEL POLICY AT THE ENTERPRISES OF PASSENGER MOTOR TRANSPORT by Y. Proshina

    Published 2016-06-01
    “…The role of the labor potential in securing and improving the competitiveness of the passenger motor transportation enterprises. …”
    Get full text
    Article
  2. 5322

    THE EXPERIENCE OF COMBATING THE SHADOW ECONOMY IN THE EUROPEAN COUNTRIES by E. Hakopyan

    Published 2018-01-01
    “…In the first place among them is the modernization of the tax and social security systems. Long-term initiatives in the field of creating «e-government», in particular electronic payments in the public sector are one of the most important elements in changing the «old habits» of using cash.…”
    Get full text
    Article
  3. 5323

    Cybercrimes: A Proposed Taxonomy and Challenges by Harmandeep Singh Brar, Gulshan Kumar

    Published 2018-01-01
    “…We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of cybersecurity. …”
    Get full text
    Article
  4. 5324

    Context-aware and self-adaptive trust model for pervasive computing by Jiang-tao WANG, Zhi-gang CHEN, Xiao-heng DENG

    Published 2012-11-01
    “…To cope with the behaviour trust problems emerging at ve environments,a context-aware and selfadaptive trust model(CASATM) for pervasive environments was proposed,the trust model provided security protection based on service content adaptively at various level,nd be sensitive to contexts such as time,location and service content.A simple and efficient risk evaluation model was presented to initialize trust value to unknown entities which was a common phenomenon in pervasive environments.Simulation results testify to the contexts awareness of this model,as well as resistance of periodically cheating behaviour from malicious entity.…”
    Get full text
    Article
  5. 5325

    L’offre alimentaire urbaine face au défi de la diffusion des supermarchés. Regards croisés sur Rio de Janeiro et Brasilia by Emília de Medeiros Silva Jomalinis, Juscelino Eudâmidas Bezerra, Ève Anne Bühler

    Published 2023-06-01
    “…These case studies shed light on the profiles of the main groups involved, their localization strategies and marketing segmentation related to the socio-economic characteristics of the population, and food and nutrition security.…”
    Get full text
    Article
  6. 5326

    FARMERS AND HERDERS CONFLICT: THE CASE OF OMALA LOCAL GOVERNMENT AREA by Fidelis Achoba, Mercy Ura Abraham

    Published 2023-08-01
    “…The study recommended among other things that the crisis would be averted if the government can secure appropriate ranches for the herders to graze their cattle. …”
    Get full text
    Article
  7. 5327

    Neither Peace nor War—U.S.-Cuban Political Coexistence from 1963 to 1964 by Krzysztof Siwek

    Published 2023-07-01
    “…A political coexistence of the two states, under managed conditions of neither peace nor war, assured the benefits of reasonable security and long-term international credibility as well as political identity to both the United States and Cuba.…”
    Get full text
    Article
  8. 5328

    Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control by Lika Li, Zexiong Ma, Qingnian Chen, Cheng Li

    Published 2014-11-01
    “…According to the root cause analysis, telephone fraud mechanism and behavior characteristics were discussed, network security model and the control system were researched, the recommending of core network number protection ability to ascend was proposed, and a set of early warning and intercept technology system based on big data model of signaling was developed. …”
    Get full text
    Article
  9. 5329

    Research on smart authentication authorization and accounting in next generation network by ZHANG Hong

    Published 2006-01-01
    “…With the fast development of Internet,there were more and more network access methods and network services.But too many accounts were inconvenient for users to perform the AAA(authentication,authorization and accounting),and many service providers hadn’t appropriate AAA mechanisms.In order to solve these problems,the smart AAA was introduced.The architecture of the smart AAA was designed,and SOAP based SAML was used to exchange security information between smart AAA and other service providers.Analysis indicates the smart AAA will provide the universal and intelligent AAA services for both users and operators.…”
    Get full text
    Article
  10. 5330

    Tag dynamic ownership transfer protocol for multi-owner with weights by Yong GAN, Zong-qin YANG, Lei HE, Chao DU, Si-cong LIU

    Published 2017-04-01
    “…A dynamic ownership transfer protocol of RFID tag based on Lagrange algorithm was proposed to achieve the transfer for multi-owner with different weights.When the ownership of a tag changed,the agreement could recover the original secret key to verify the legitimacy of the owners,and use secret sharing algorithm to redistribute sub-key according to the new weights of the owners to make the security and flexibility of the ownership transfer improved.The simulation is carried out to show that it adapts to a low-cost RFID tag because the calculation and time consuming are low in the protocol.…”
    Get full text
    Article
  11. 5331

    Keeping a Household Inventory and Protecting Valuable Records by Regina Fegan, Michael T. Olexa

    Published 2003-07-01
    “…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
    Get full text
    Article
  12. 5332

    Analysis of some key technical problems in the development of computing power network by Tao HE, Zhendong YANG, Chang CAO, Yan ZHANG, Xiongyan TANG

    Published 2022-06-01
    “…The current development status of domestic and foreign computing power network technology was introduced.The key technology of the computing power network was described.The problems which were encountered in the development and practice of the computing power network technology were deeply analyzed from five aspects and the preliminary solutions were proposed.The five aspects include the computing power measurement and computing power modeling, the routing decision based on the computing power information, the computing power collaboration of cloud-edge-end, the integration of cloud and network based on service, and the computing power network information security.…”
    Get full text
    Article
  13. 5333

    Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications by Mohammad Aldossary, Ibrahim Alzamil, Jaber Almutairi

    Published 2025-01-01
    “…This study pioneers a unified security solution for Drone-to-Drone (D2D) and Drone-to-Base Station (D2BS) communications, filling a crucial IoD security gap. …”
    Get full text
    Article
  14. 5334

    Phosphogypsum as Fertilizer: Impacts on Soil Fertility, Barley Yield Components, and Heavy Metals Contents by M Barka Outbakat, Moussa Bouray, Redouane Choukr-Allah, Mohamed El Gharous, Kamal El Omari, Khalil El Mejahed

    Published 2024-12-01
    “…Fertilization is a critical input factor in crop production and food security achievement. Therefore, fertilization is a critical input factor in crop production and food security achievement. …”
    Get full text
    Article
  15. 5335

    Experience-based food insecurity in Bangladesh: Evidence from Household Income and Expenditure Survey 2022 by Faria Rauf Ria, Md. Muhitul Alam, Md. Azad Uddin, Mohaimen Mansur, Md. Israt Rayhan

    Published 2025-01-01
    “…Key factors found to be significantly associated with food security include the wealth index, land ownership, education of the household head, family size, remittance income and exposure to shocks. …”
    Get full text
    Article
  16. 5336

    Enabling smart parking for smart cities using Internet of Things (IoT) and machine learning by Mofadal Alymani, Lenah Abdulaziz Almoqhem, Dhuha Ahmed Alabdulwahab, Abdulrahman Abdullah Alghamdi, Hussain Alshahrani, Khalid Raza

    Published 2025-01-01
    “…This eliminates the need for security personnel to verify vehicle identities or stickers manually, streamlining access procedures. …”
    Get full text
    Article
  17. 5337

    Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies by Florian Guitton, Axel Oehmichen, Étienne Bossé, Yike Guo

    Published 2024-01-01
    “…We also introduce a reference framework to achieve demonstrable data lineage and provenance, contrasting it with Secure Computing, a related but differently orientated form of computing. …”
    Get full text
    Article
  18. 5338

    A study on the optimal allocation of photovoltaic storage capacity for rural new energy microgrids based on double-layer multi-objective collaborative decision-making by Huixuan Li, Peng Li, Xianyu Yue, Yongle Zheng, Wenjing Zu, Hongkai Zhang

    Published 2025-01-01
    “…First, an outer optimization objective function containing constraints on capacity allocation, line transmission security, charging and discharging power of the energy storage system, microgrid security, and power supply reliability was constructed, and an inner optimization objective function containing constraints on energy storage self-discharge correction and power balance was constructed. …”
    Get full text
    Article
  19. 5339

    Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges by M. Sunil Kumar, D. Ganesh

    Published 2024-09-01
    “…However, significant challenges are addressed, including data security, interoperability, and reliable internet connectivity in various healthcare settings. …”
    Get full text
    Article
  20. 5340

    Assessment of post-harvest fish losses at the fishers’ level in Lake Tana, Ethiopia by Solomon Birie, Minwyelet Mingist, Mulugeta Kibret

    Published 2025-01-01
    “…Fish are essential for ensuring food and nutrition security; and economic growth. However, post-harvest loss poses a significant challenge in the value chain due to the perishable nature of fish. …”
    Get full text
    Article